{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:18:51Z","timestamp":1775470731992,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/100004358","name":"Samsung","doi-asserted-by":"publisher","award":["SRFC-TB1403-52"],"award-info":[{"award-number":["SRFC-TB1403-52"]}],"id":[{"id":"10.13039\/100004358","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010418","name":"Institute for Information and communications Technology Promotion","doi-asserted-by":"publisher","award":["2017-0-00616 (development of lattice-based post-quantum public-key cryptographic schemes)"],"award-info":[{"award-number":["2017-0-00616 (development of lattice-based post-quantum public-key cryptographic schemes)"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2016R1C1B2011022"],"award-info":[{"award-number":["NRF-2016R1C1B2011022"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2018.2884084","type":"journal-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:03:30Z","timestamp":1543881810000},"page":"2080-2091","source":"Crossref","is-referenced-by-count":31,"title":["RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4776-5783","authenticated-orcid":false,"given":"Joohee","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4766-3456","authenticated-orcid":false,"given":"Duhyeong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyungkyu","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1767-6165","authenticated-orcid":false,"given":"Younho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"ref38","author":"cheon","year":"2018","journal-title":"Algorithm Specification of Lizard Post-Quantum Cryptography Standardization 1st Round submission"},{"key":"ref33","first-page":"663","article-title":"Efficient ring-LWE encryption on 8-bit AVR processors","volume":"9293","author":"liu","year":"2015","journal-title":"Proc Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2700078"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"698","DOI":"10.23919\/DATE.2017.7927079","article-title":"Towards post-quantum security for IoT endpoints with NTRU","author":"guillen","year":"2017","journal-title":"Proc Design Autom Test Eur Conf Exhibition (DATE)"},{"key":"ref30","first-page":"319","article-title":"Better key sizes (and attacks) for LWE-based encryption","volume":"6558","author":"lindner","year":"2011","journal-title":"Topics in Cryptology&#x2014;CT-RSA"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2015.31"},{"key":"ref36","first-page":"101","article-title":"pCLSC-TKEM: A pairing-free certificateless signcryption-tag key encapsulation mechanism for a privacy-preserving IoT","volume":"9","author":"seo","year":"2016","journal-title":"Trans Data Privacy"},{"key":"ref35","article-title":"Efficient software implementation of ring-LWE encryption on IoT processors","author":"liu","year":"0","journal-title":"IEEE Trans Comput"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62024-4_6"},{"key":"ref28","first-page":"172","article-title":"NAEP: Provable security in the presence of decryption failures","author":"howgrave-graham","year":"2003","journal-title":"IACR Cryptology ePrint"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/978-3-319-70500-2_12","article-title":"A modular analysis of the Fujisaki&#x2013;Okamoto transformation","author":"hofheinz","year":"2017","journal-title":"Proc Theory Cryptography"},{"key":"ref2","article-title":"Towards a definition of the Internet of Things (IoT)","author":"minerva","year":"0","journal-title":"The Internet-II initiative"},{"key":"ref1","year":"2018","journal-title":"Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3055399.3055489"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_6"},{"key":"ref21","author":"chase","year":"2017","journal-title":"Security of Homomorphic Encryption Draft Homomorphic Encryption Standard"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_4"},{"key":"ref23","first-page":"1","article-title":"Vulnerable Galois RLWE families and improved attacks","author":"chen","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-3-662-49096-9_9","article-title":"On the hardness of learning with rounding over small modulus","author":"bogdanov","year":"2016","journal-title":"Proc Theory Cryptogr Conf"},{"key":"ref25","first-page":"719","article-title":"Pseudorandom functions and lattices","author":"banerjee","year":"2012","journal-title":"Proc Int Conf Theory Appl Cryptographic Techn"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-017-9265-9"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1570-1"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-319-11659-4_12","article-title":"Lattice cryptography for the Internet","author":"peikert","year":"2014","journal-title":"PRoc the 2nd Int Workshop on Post-Quantum Cryptography"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/79.985679"},{"key":"ref53","author":"monk","year":"2014","journal-title":"Programming Arduino Next Steps Going Further with Sketches"},{"key":"ref52","first-page":"44","article-title":"An efficient lattice-based signature scheme with provably secure instantiation","volume":"9646","author":"akleylek","year":"2016","journal-title":"Proc AFRICACRYPT"},{"key":"ref10","first-page":"353","article-title":"CRYSTALS&#x2014;Kyber: A CCA-secure module-lattice-based KEM","author":"bos","year":"2018","journal-title":"Proc 3rd IEEE Eur Symp Secur Privacy"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978425"},{"key":"ref40","first-page":"700","article-title":"Trapdoors for lattices: Simpler, tighter, faster, smaller","volume":"7237","author":"micciancio","year":"2012","journal-title":"Adv Cryptology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_9"},{"key":"ref13","first-page":"282","article-title":"Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM","volume":"10831","author":"d\u2019anvers","year":"2018","journal-title":"Int Conf Cryptol Africa"},{"key":"ref14","first-page":"3","article-title":"Choosing parameters for NTRUEncrypt","volume":"10159","author":"hoffstein","year":"2017","journal-title":"Proc Topics Crypt -CT-RSA"},{"key":"ref15","first-page":"232","article-title":"High-speed key encapsulation from NTRU","volume":"10529","author":"h\u00fclsing","year":"2017","journal-title":"Proc Cryptograph Hardware Embedded Syst Conf"},{"key":"ref16","year":"2017","journal-title":"Post-Quantum Cryptography Standardization"},{"key":"ref17","first-page":"1","article-title":"On ideal lattices and learning with errors over rings","volume":"6110","author":"lyubashevsky","year":"2010","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"ref18","first-page":"617","article-title":"Efficient public key encryption based on ideal lattices","author":"stehl\u00e9","year":"2009","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Secur"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2707465"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2549047"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"ref8","first-page":"327","article-title":"Post-quantum key exchange&#x2014;A new hope","author":"alkim","year":"2016","journal-title":"Proc Usenix Secur Symp"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600522CM"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.202"},{"key":"ref9","first-page":"235","article-title":"NTRU prime: Reducing attack surface at low cost","volume":"10719","author":"bernstein","year":"2017","journal-title":"Proc Int Conf Sel Areas Cryptogr"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1515\/jmc-2015-0016","article-title":"On the concrete hardness of learning with errors","volume":"9","author":"albrecht","year":"2015","journal-title":"J Math Cryptol"},{"key":"ref45","author":"albrecht","year":"2017","journal-title":"A Sage Module for Estimating the Concrete Security of Learning With Errors Instances"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_9"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/978-3-319-59879-6_11","article-title":"A hybrid lattice basis reduction and quantum search attack on LWE","author":"g\u00f6pfert","year":"2017","journal-title":"PRoc the 2nd Int Workshop on Post-Quantum Cryptography"},{"key":"ref42","first-page":"297","article-title":"Revisiting the expected cost of solving uSVP and applications to LWE","volume":"10624","author":"albrecht","year":"2017","journal-title":"Proc Adv Cryptol -ASIACRYPT"},{"key":"ref41","first-page":"103","article-title":"On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL","volume":"10211","author":"albrecht","year":"2017","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0067-5"},{"key":"ref43","first-page":"1","article-title":"BKZ 2.0: Better lattice security estimates","volume":"7073","author":"chen","year":"2011","journal-title":"Proc Adv Cryptol -ASIACRYPT"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08555993.pdf?arnumber=8555993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T21:55:56Z","timestamp":1643147756000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8555993\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2884084","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}